2 research outputs found

    An Image Encryption Scheme Based on Chaotic Logarithmic Map and Key Generation using Deep CNN

    Full text link
    A secure and reliable image encryption scheme is presented in this study. The encryption scheme hereby introduces a novel chaotic log-map, deep convolution neural network (CNN) model for key generation, and bit reversion operation for the manipulation process. Thanks to the sensitive key generation, initial values and control parameters are produced for the hyperchaotic log-map, and thus a diverse chaotic sequence is achieved for encrypting operations. The scheme then encrypts the images by scrambling and manipulating the pixels of images through four operations: permutation, DNA encoding, diffusion, and bit reversion. The encryption scheme is precisely examined for the well-known images in terms of various analyses such as keyspace, key sensitivity, information entropy, histogram, correlation, differential attack, noisy attack, and cropping attack. To corroborate the scheme, the visual and numerical results are even compared with available outcomes of the state of the art. Therefore, the proposed log-map based image encryption scheme is successfully verified and validated by the superior absolute and comparative results

    Coupling Chaotic System Based on Unit Transform and Its Applications in Image Encryption

    Full text link
    Chaotic maps are very important for establishing chaos-based image encryption systems. This paper introduces a coupling chaotic system based on a certain unit transform, which can combine any two 1D chaotic maps to generate a new one with excellent performance. The chaotic behavior analysis has verified this coupling system's effectiveness and progress. In particular, we give a specific strategy about selecting an appropriate unit transform function to enhance chaos of generated maps. Besides, a new chaos based pseudo-random number generator, shorted as CBPRNG, is designed to improve the distribution of chaotic sequences. We give a mathematical illustration on the uniformity of CBPRNG, and test the randomness of it. Moreover, based on CBPRNG, an image encryption algorithm is introduced. Simulation results and security analysis indicate that the proposed image encryption scheme is competitive with some advanced existing methods.Comment: 41 pages, 15 figure
    corecore